Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (735)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 98 Next »

9%
Load Testing the Cloud
20.02.2012
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
: “That’s it. Ship it”? Is there something lurking in there that’s going to hurt you on the first day in production? Too often, I’ve seen people get hung up on one or two load times as an indicator
9%
Credential harvesting at the network interstice
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Galyna Andrushko, 123RF
to provide real-time checks to see if you're using a compromised password. Harvester Targets Credential harvesters usually attack wherever the action is. I tend to describe the current credential
9%
Interview: Hardware or Cloudware?
10.04.2012
Home »  HPC  »  Articles  » 
centers in some random company are going to be using their couple of email machines maybe 20 percent of the time – so 20 percent utilization – leaving a huge amount of waste. Consolidating that is a huge
9%
Hackers Infected DC Police Cameras Before Trump’s Inauguration
31.01.2017
Home »  News  » 
 
of ransomware on four recording devices. That’s when they started investigating other sites and discovered more sites with ransomware. The good news is that each site had four cameras connected to each recording
9%
TUI Tools for Containers
07.10.2024
Home »  HPC  »  Articles  » 
below it. Finally, the bottom strip has a real-time chart of network usage for both data in and data out of the system. The list to the right has the top processes with their CPU and memory usage
9%
The advantages of configuration management tools
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Galina Peshkova, 123RF.com
and all its services in the end. The programs presented here aim to help and go beyond the scope of simple configuration management: They aim to be a reliable source in scale-out setups that can provide
9%
What's new in SQL Server 2016
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © alphaspirit, 123RF.com
stores frequently used tables directly in the working memory to provide faster access. It should also be possible to process real-time data better and faster in the future. In addition to real-time
9%
Choosing between the leading open source configuration managers
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Giuseppe Ramos, 123RF.com and Paulus Rusyanto, Fotolia.com
admins prefer to invest their time up front in labor-saving custom tools that will save time and energy on repetitive tasks. Puppet [1] and Chef [2] are two open source configuration management tools
9%
Small-board computers
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Author, 123RF.com
.041GFLOPS for double-precision. This level of performance won't get a cluster of Raspberry Pi's on the TOP500 any time soon, but that's not the real point of the RPi. The point is to get fully featured
9%
Service mesh for Kubernetes microservices
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image by Ricardo Gomez Angel on Unsplash.com
on each hardware node. The application's pods within the node communicate with each other as usual, but internode communication, which has to use a "real" network, is routed via an agent that provides

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice